Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.217.42.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.217.42.9.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 19:41:15 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 9.42.217.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.42.217.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.202.164.82 attackbots
Feb 27 02:31:24 server sshd\[27383\]: Failed password for invalid user redbot from 149.202.164.82 port 44978 ssh2
Feb 27 08:33:38 server sshd\[7203\]: Invalid user scarab from 149.202.164.82
Feb 27 08:33:38 server sshd\[7203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 
Feb 27 08:33:40 server sshd\[7203\]: Failed password for invalid user scarab from 149.202.164.82 port 36824 ssh2
Feb 27 08:43:21 server sshd\[9308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82  user=nagios
...
2020-02-27 19:44:36
190.186.80.129 attackspam
1582782196 - 02/27/2020 06:43:16 Host: 190.186.80.129/190.186.80.129 Port: 445 TCP Blocked
2020-02-27 19:49:02
104.5.75.130 attack
Honeypot attack, port: 4567, PTR: 104-5-75-130.lightspeed.irvnca.sbcglobal.net.
2020-02-27 19:45:40
107.175.70.252 attack
(From effectiveranking4u@gmail.com) Hello, 

I'm a web traffic optimizer, and I noticed that as I used my SEO reporting tools, there's a lot of room for improvement for your website to rank higher on search engine results. This means that you have a great potential to be easily found by potential clients searching for products/services online if the issues on your website get fixed. 

Google has a way of "crawling" your site and looking for certain keywords that they index to what people online are searching. The more optimized your site is, the higher ranking you get! This leads to more online credibility, thus more sales! With my skills and knowledge, I guarantee that can put your website ahead of your competitors. 

If you're interested in hearing more, I can give you a free consultation for you to be more informed. Don't worry about my fees since my target is to accommodate small businesses at a cheap price. Let me know what time is best for you to be contacted, and I'll gladly reach out via a phone
2020-02-27 20:18:03
184.105.247.251 attack
" "
2020-02-27 20:06:51
187.202.146.47 attackspambots
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=14600)(02271114)
2020-02-27 20:08:21
36.90.68.107 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-27 19:42:59
113.53.132.123 attackspam
Honeypot attack, port: 445, PTR: node-vv.pool-113-53.dynamic.totinternet.net.
2020-02-27 20:12:40
193.228.108.122 attackbotsspam
Feb 27 12:04:17 jane sshd[5129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.228.108.122 
Feb 27 12:04:18 jane sshd[5129]: Failed password for invalid user dave from 193.228.108.122 port 42342 ssh2
...
2020-02-27 19:55:10
14.248.23.208 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-27 20:19:20
45.170.220.90 attack
Port probing on unauthorized port 8080
2020-02-27 20:23:05
192.241.215.218 attack
3389/tcp 2362/udp 29288/tcp...
[2020-02-14/27]13pkt,10pt.(tcp),2pt.(udp)
2020-02-27 19:55:28
189.203.130.134 attackspambots
unauthorized connection attempt
2020-02-27 19:45:22
182.155.102.250 attackbots
9530/tcp
[2020-02-27]1pkt
2020-02-27 20:21:18
195.113.20.155 attack
Feb 27 11:18:22 localhost sshd\[24242\]: Invalid user gitlab from 195.113.20.155 port 54932
Feb 27 11:18:22 localhost sshd\[24242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.113.20.155
Feb 27 11:18:24 localhost sshd\[24242\]: Failed password for invalid user gitlab from 195.113.20.155 port 54932 ssh2
2020-02-27 19:43:28

Recently Reported IPs

40.230.86.18 49.38.123.157 49.233.48.46 33.123.60.75
20.2.19.110 203.162.148.52 167.88.224.225 196.255.104.216
33.184.145.193 163.66.70.195 226.160.101.162 252.255.47.87
209.123.182.27 232.193.128.229 134.47.66.97 233.169.1.117
249.221.135.23 187.172.82.81 116.136.222.133 20.225.228.66